Sie sind auf Seite 1von 39

IP SCANNER

Synopsis
This Project Titled IP SCANNER is the software application developed for analyzing networks. The project lets us to have all information about network computers. The project is developed using Microsoft Visual Basic .Net 2003 and Microsoft Access 2000 as back end. The .Net Framework version used is 1.1. The project contains options for scanning IP addresses in any range. The IP scanner simply pings each IP address to check if it's alive, then optionally it is resolving its hostname, determines the MAC address, scans ports, etc. The amount of gathered data about each host can be extended. Scanning results can be saved as TXT or HTML page. We can determine the computer name, workgroup name, MAC Address and other port details of the required computer in the network. We can also explore the remote system. The project can scan 'B' (Class B networks (128.0.x.x to 191.255.x.x) have a 16bit network prefix with a 16-bit host number, and are also referred to as /16 networks) or even 'C' (Class C networks (192.0.0.x to 223.255.255.x) require 24 bits to identify the network, leaving 8 to identity the host, and are also referred to as /24 networks) class.

CONTENTS
S. No. 1 TITLE INTRODUCTION
1.1 About the Organization 1.2 Overview of the Project

PAGE No.

SYSTEM ANALYSIS
2.1 Existing System 2.2 Proposed System

SYSTEM REQUIREMENT
3.1 Hardware Configuration 3.2 Software Configuration

4 5

FEASIBILITY STUDY SYSTEM DESIGN


5.1 Input Design 5.2 Database Design 5.3 Code Design 5.4 Output Design 5.5 System Flow Diagram 5.6 Data Flow Diagram

SYSTEM TESTING
6.1 Unit Testing 6.2 Integration Testing 6.3 Validation Testing 6.4 Acceptance Testing

SYSTEM IMPLEMENTATION AND MAINTENANCE


7.1 Implementation 7.2 Maintenance

8 9 10 11

CONCLUSION SCOPE FOR FUTURE ENHANCEMENT BIBLIOGRAPHY APPENDIX


11.1 Screens 11.2 Reports 11.3 Source Coding

1.2 OVER VIEW OF THE PROJECT


MODULE DESCRIPTION
The project contains the following modules: 1. IP Address Details 2. Gathering Node Details 3. Port Scanning 4. Nodes Details View 5. User Management

1. IP Address Details
The module contains options for adding IP Address to the table. We enter the IP Address by selecting values cell by cell. We can also type the Website name to obtain the IP Address and thereby add it to the table. We can view all the IP Addresses added.

2. Gathering Node Details


The module contains options for finding computer name, workgroup name the computer belongs, the MAC Address, ping time to the node, and TTL(Time To Live) value. The gathered data is saved into the table for future reference.

3. Port Scanning
The module contains options for scanning local as well as remote system port whether the port is in use or free.

4. Node details view


The module contains options for viewing all the IP Addresses with other information such as computer name, workgroup name, etc

5. User Management
The module contains options for creating users who can logging to this application and change the password.

PROJECT DESCRIPTION
This project has following modules

IP address
a. Add IP address b. Delete IP Address

Show
c. Computer Name d. Group Name e. MAC address f. Time To Live g. Ping h. Trace Route i. Listen Local ports j. Listen Remove ports

View
k. IP address List.

Connect
l. FTP m. HTTP

Settings
n. Change password

User
o. Create user p. Change password

Exit

IP Address
a. Add IP Address
It is used to update the new IP address and allows editing and clearing the IP Address.

b.

Delete IP Address
It is used to delete the existing IP address.

Show
c. Computer Name
It is used to give the computer, Workgroup Name and MAC Address depends upon the IP address.

d. e.

Group Name
It is used to display the group name of the computers.

MAC (Media Access Control)


It is used to display the Media Access Control Address.

View
f. IP Address List
It is used to view the IP Address, computer Name, Work Group Name and its MAC address.

Connect
g. FTP
Its acronym is File Transfer Protocol; it is used to enable the FTP connectivity for the required IP address.

h.

HTTP
Its acronym is Hyper Text Transfer Protocol; it is used to enable the HTTP

connectivity for the required IP address.

Settings
i. Change password
It is used to change the password of the existing one.

About
It gives the details of the software.

Users
j. k. Create User
It is used to create the new user, for this it should have name and its password.

Change password
It is used to change the user password.

Exit
It is used to exiting from the application.

2. SYSTEM ANALYSIS
2.1 EXISTING SYSTEM
The Existing system is working under command mode in the disk operating system for getting the data from the other nodes in the networks like ping, route, etc., for accessing every information the user wants to have in the disk operating system and access the information by type in keyboard in DOS mode. External command program directly executable by the operating system.

DISADVANTAGES OF THE EXISTING SYSTEM


The disadvantages of the Existing system Memorizing the command is necessary. We cant get the abundant information about nodes in the enterprises. It has low security. Here couldnt connect the FTP and HTTP protocols. Low privileges to the administrator Cannot get the multi information simultaneously due to Single tasking operating system.

2.2 PROPOSED SYSTEM


The proposed system is working under GUI mode, IP Scanner is a port scanning regime, it is a cross-platform network scanner designed to be fast and simple to use. It scans IP addresses and ports as well as has many other features. It is widely used by network administrators and just curious users around the world, including large and small enterprises, banks, and government agencies. It lets you have various types of information about local network computers in a few seconds. It gives you one-click access.

ADVANTAGES OF THE PROPOSED SYSTEM


The proposed system has following advantages This system can scans the hundreds of computers and list out the IP Address. It enables us to connect the HTTP and FTP protocol. Enable us to add and delete the new computer in the network. It provides the in depth scanning of the network. More reliability than existing system. Time consumption is very less. Access the multi-information simultaneously because of multi-tasking.

3. SYSTEM REQUIREMENT
HARDWARE AND SOFTWARE CONFIGURATION
3.1 HARDWARE SPECIFICATION
The hardware used for the development of the project is: Processor Hard Disk Capacity RAM Monitor Keyboard Mouse : Pentium III 866 MHz : 40 GB : 128 MB : 15 Color : 102 keys : 3 buttons

3.2 SOFTWARE SPECIFICATION


The software used for the development of the project is: Operating system Environment .Net framework Front end Back end : : : : : Windows XP professional Visual studio .Net 2003 Version 1.1 Visual Basic.Net Ms Access 2000.

SOFTWARE DESCRIPTION
THE .NET FRAMEWORK
The .NET Framework is a new computing platform that simplifies application development in the highly distributed environment of the Internet.

OBJECTIVES OF. NET FRAMEWORK:


1. To provide a consistent object-oriented programming environment whether object codes is stored and executed locally on Internet-distributed, or executed remotely. 2. 3. To provide a code-execution environment to minimizes software deployment and guarantees safe execution of code. Eliminates the performance problems. There are different types of application, such as Windows-based applications and Web-based applications. To make communication on distributed environment to ensure that code be accessed by the .NET Framework can integrate with any other code.

COMPONENTS OF. NET FRAMEWORK


1. THE COMMON LANGUAGE RUNTIME (CLR)
The common language runtime is the foundation of the .NET Framework. It manages code at execution time, providing important services such as memory management, thread management, and remoting and also ensures more security and robustness. The concept of code management is a fundamental principle of the runtime. Code that targets the runtime is known as managed code, while code that does not target the runtime is known as unmanaged code.

THE .NET FRAME WORK CLASS LIBRARY


It is a comprehensive, object-oriented collection of reusable types used to develop applications ranging from traditional command-line or graphical user interface (GUI) applications to applications based on the latest innovations provided by ASP.NET, such as Web Forms and XML Web services. The .NET Framework can be hosted by unmanaged components that load the common language runtime into their processes and initiate the execution of managed code, thereby creating a software environment that can exploit both managed and unmanaged features. The .NET Framework not only provides several runtime hosts, but also supports the development of third-party runtime hosts. Internet Explorer is an example of an unmanaged application that hosts the runtime (in the form of a MIME type extension). Using Internet Explorer to host the runtime to enables embeds managed components or Windows Forms controls in HTML documents.

FEATURES OF THE COMMON LANGUAGE RUNTIME


The common language runtime manages memory; thread execution, code execution, code safety verification, compilation, and other system services these are all run on CLR. Security Robustness Productivity Performance

SECURITY
The runtime enforces code access security. The security features of the runtime thus enable legitimate Internet-deployed software to be exceptionally feature rich. With regards to security, managed components are awarded varying degrees of trust, depending on a number of factors that include their origin to perform file-access operations, registry-access operations, or other sensitive functions.

ROBUSTNESS
The runtime also enforces code robustness by implementing a strict type- and code-verification infrastructure called the common type system(CTS). The CTS ensures that all managed code is self-describing. The managed environment of the runtime eliminates many common software issues.

PRODUCTIVITY
The runtime also accelerates developer productivity. For example, programmers can write applications in their development language of choice, yet take full advantage of the runtime, the class library, and components written in other languages by other developers.

PERFORMANCE
The runtime is designed to enhance performance. Although the common language runtime provides many standard runtime services, managed code is never interpreted. A feature called just-in-time (JIT) compiling enables all managed code to run in the native machine language of the system on which it is executing. Finally, the runtime can be hosted by high-performance, server-side applications, such as Microsoft SQL Server and Internet Information Services (IIS).

DATA ACCESS WITH ADO.NET


As we develop applications using ADO.NET, you will have different requirements ADO.NET. ADO.NET offers several advantages over previous versions of ADO: Interoperability Maintainability Programmability Performance Scalability for working with data. You might never need to directly edit an XML file containing data - but it is very useful to understand the data architecture in

INTEROPERABILITY
ADO.NET applications can take advantage of the flexibility and broad acceptance of XML. Because XML is the format for transmitting datasets across the network, any component that can read the XML format can process data. The receiving component need not be an ADO.NET component. The transmitting component can simply transmit the dataset to its destination without regard to how the receiving component is implemented. The destination component might be a Visual Studio application or any other application implemented with any tool whatsoever. The only requirement is that the receiving component be able to read XML. SO, XML was designed with exactly this kind of interoperability in mind.

MAINTAINABILITY
In the life of a deployed system, modest changes are possible, but substantial, Architectural changes are rarely attempted because they are so difficult. As the performance load on a deployed application server grows, system resources can become scarce and response time or throughput can suffer. Faced with this problem, software architects can choose to divide the server's business-logic processing and user-interface processing onto separate tiers on separate machines. In effect, the application server tier is replaced with two tiers, alleviating the shortage of system resources. If the original application is implemented in ADO.NET using datasets, this transformation is made easier. ADO.NET data components in Visual Studio encapsulate data access functionality in various ways that help you program more quickly and with fewer mistakes.

PERFORMANCE
ADO.NET datasets offer performance advantages over ADO disconnected record sets. In ADO.NET data-type conversion is not necessary.

SCALABILITY
ADO.NET accommodates scalability by encouraging programmers to conserve limited resources. Any ADO.NET application employs disconnected access to data; it does not retain database locks or active database connections for long durations.

VISUAL STUDIO .NET


Visual Studio .NET is a complete set of development tools for building ASP Web applications, XML Web services, desktop applications, and mobile applications In addition to building high-performing desktop applications, you can use Visual Studio's powerful component-based development tools and other technologies to simplify teambased design, development, and deployment of Enterprise solutions. Visual Basic .NET, Visual C++ .NET, and Visual C# .NET all use the same integrated development environment (IDE), which allows them to share tools and facilitates in the creation of mixed-language solutions. In addition, these languages leverage the functionality of the .NET Framework and simplify the development of ASP Web applications and XML Web services. Visual Studio supports the .NET Framework, which provides a common language runtime and unified programming classes; ASP.NET uses these components to create ASP Web applications and XML Web services. Also it includes MSDN Library, which contains all the documentation for these development tools.

VISUAL BASIC .NET


Visual Basic. NET, the latest version of visual basic, includes many new features. The Visual Basic supports interfaces but not implementation inheritance. Visual basic.net supports implementation inheritance, interfaces and overloading. In addition, Visual Basic .NET supports multithreading concept.

COMMON LANGUAGE SPECIFICATION (CLS)


Visual Basic.NET is also compliant with CLS (Common Language Specification) and supports structured exception handling. CLS is set of rules and constructs that are supported by the CLR (Common Language Runtime). CLR is the runtime environment provided by the .NET Framework; it manages the execution of the code and also makes the development process easier by providing services. Visual Basic.NET is a CLS-compliant language. Any objects, classes, or components that created in Visual Basic.NET can be used in any other CLS-compliant language. In addition, we can use objects, classes, and components created in other CLS-compliant languages in Visual Basic.NET .The use of CLS ensures complete interoperability among applications, regardless of the languages used to create the application.

IMPLEMENTATION
Visual Basic.NET supports implementation inheritance. This means that, while creating applications in Visual Basic.NET, we can drive from another class, which is know as the base class that derived class inherits all the methods and properties of the base class. In the derived class, we can either use the existing code of the base class or override the existing code. Therefore, with help of the implementation inheritance, code can be reused.

CONSTRUCTORS AND DESTRUCTORS


Constructors are used to initialize objects, whereas destructors are used to destroy them. In other words, destructors are used to release the resources allocated to the object. In Visual Basic.NET the sub finalize procedure is available. The sub finalize procedure is used to complete the tasks that must be performed when an object is destroyed. The sub finalize procedure is called automatically when an object is destroyed. In addition, the sub finalize procedure can be called only from the class it belongs to or from derived classes.

GARBAGE COLLECTION
Garbage Collection is another new feature in Visual Basic.NET. The .NET Framework monitors allocated resources, such as objects and variables. In addition, the .NET Framework automatically releases memory for reuse by destroying objects that are no longer in use. In Visual Basic.NET, the garbage collector checks for the objects that are not currently in use by applications. When the garbage collector comes across an object that is marked for garbage collection, it releases the memory occupied by the object.

OVERLOADING
Overloading is another feature in Visual Basic.NET. Overloading enables us to define multiple procedures with the same name, where each procedure has a different set of arguments. Besides using overloading for procedures, we can use it for constructors and properties in a class.

MULTITHREADING
Visual Basic.NET also supports multithreading. An application that supports multithreading can handle multiple tasks simultaneously, we can use multithreading to decrease the time taken by an application to respond to user interaction. To decrease the time taken by an application to respond to user interaction, we must ensure that a separate thread in the application handles user interaction.

STRUCTURED EXCEPTION HANDLING


Visual Basic.NET supports structured handling, which enables us to detect and remove errors at runtime. In Visual Basic.NET, we need to use TryCatchFinally statements to create exception handlers. Using TryCatchFinally statements, we can create robust and effective exception handlers to improve the performance of our application.

MS -ACCESS 2000
It is a personal computer based RDBMS. This provides most of the features available in the high-end RDBMS products like Oracle, Sybase, Ingress etc. VB keeps access as its native database. Developer can create a database for development & further can create. The tables are required to store data. During the initial Development phase data can be stored in the access database & during the implementation phase depending on the volume data can use a higher end database. Office Access, previously known as Microsoft Access, is an active secure database embedded in a virtual object-oriented work cluster. It is a member of the 2007 Microsoft Office system. Access can use data stored in Access/Jet, Microsoft SQL Server, Oracle, or any ODBC-compliant data container. Skilled software developers and data architects use it to develop application software. Relatively unskilled programmers and nonprogrammer "power users" can use it to build simple applications. It supports some object-oriented (OO) techniques but falls short of being a fully OO development tool. Access was also the name of a communications program from Microsoft, meant to compete with ProComm and other programs. This Access proved a failure and was dropped. Years later Microsoft reused the name for its database software.

4. FEASIBILITY STUDY
The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for the project and some cost estimates. During system analysis the feasibility study of the proposed system is to be carried out. This is to ensure that the proposed system is not a burden to the company. For feasibility analysis, some understanding of the major requirements for the system is essential. Three key considerations involved in the feasibility analysis are Economical Feasibility Technical Feasibility Social Feasibility

I. ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the system will have on the organization. The amount of fund that the company can spend into the research and development of the system is limited. The expenditures must be justified. Thus the developed system as well within the budget and this was achieved because most of the technologies used are freely available. Only the customized products had to be purchased.

II. TECHNICAL FEASIBILITY


This study is carried out to check the technical feasibility, that is, the technical requirements of the system. Any system developed must not have a high demand on the available technical resources. This will lead to high demands on the available technical resources. This will lead to high demands being placed on the client. The developed system must have a modest requirement, as only minimal or null changes are required for implementing this system.

III. SOCIAL FEASIBILITY


The aspect of study is to check the level of acceptance of the system by the user. This includes the process of training the user to use the system efficiently. The user must not feel threatened by the system, instead must accept it as a necessity. The level of acceptance by the users solely depends on the methods that are employed to educate the user about the system and to make him familiar with it. His level of confidence must be raised so that he is also able to make some constructive criticism, which is welcomed, as he is the final user of the system.

5. SYSTEM DESIGN
The design of the system is essentially a blue print, or plan for a solution of the system to be developed. A part of the system or subsystem of a whole of the system can itself be considered a system with its own complements. Here the focus is on detecting that which is all the modules method needed for the system, the specification of these design is the only way by which we can accurately translate the end-user requirements in to a finished software product or system. The data flow oriented design in an architectural design method that allows a convenient transition from the analysis model to a design description of program structure the DFD presents a system overview depicting its overall purpose an its interactions with external objects it provides a general pictorial of data transformations in the system. A DFD shows the flow of data through a system which may be a manual procedure software system, a hard ware system or any combination of these. A DFD shows the movements of the data through the different transformations, which are the process in the system. DFD are made up of a number of symbols, which represent system components, process, data store, and data flow and external entities.

5.1 INPUT DESIGN


Input Design is one of the most expensive phases of the operation of computerized system and is often the major problem of a system. A large number of problems with a system can usually be tracked backs to fault input design and method. Needless to say, therefore, that the input data is the life blood of a system and have to be analysed and designed with utmost case and consideration. The decisions made during the input design are To provide cost effective method of input. To achieve the highest possible level of accuracy. To ensure that the input is understand by the user.

System analysis decide the following input design details like, what data to input, what medium to use, hoe the data should be arranged or coded, data items and transactions needing validations to detect errors and at last the dialogue to guide user in providing input. Input data of a system may not be necessarily be raw data captured in the system from scratch. These can also be the output of another system or sub system. The design of input covers all phases of input from the creation of initial data to actual entering the data to the system for processing. The design of inputs involves identifying the data needed, specifying the characteristics of each data item, capturing and preparing data for computer processing and ensuring correctness of data.

5.2 DATABASE DESIGN


The most important consideration in designing the database is how information will be used. The main objectives of designing a database are: Data Integration Data Integrity Data Independence

Data Integration
In a database, information from several files are coordinated, accessed and operated upon as through it is in a single file. Logically, the information are centralized, physically, the data may be located on different devices, connected through data communication facilities.

Data Integrity
Data integrity means storing all data in one place only and how each application to access it. This approach results in more consistent information, one update being sufficient to achieve a new record status for all applications, which use it. This leads to less data redundancy; data items need not be duplicated; a reduction in the direct access storage requirement.

Data Independence
Data independence is the insulation of application programs from changing aspects of physical data organization. This objective seeks to allow changes in the content and organization of physical data without reprogramming of applications and to allow modifications to application programs without reorganizing the physical data. The tables needed for each module were designed and the specification of each and every column was given based on the records and details collected during record specification of the system study.

TABLE DESIGN
Table: Nodes Primary Key : IP Address Field Name S. No IP Address Computer Name Workgroup Name MAC Address Type Number Text Text Text Text Size 4 15 255 255 20

Table: Users

Field Name User Name Password

Type Text Text

Size 15 15

5.3 CODE DESIGN


The code design should be such that with less amount of coding we can achieve more results. The speed of the system will be more if the coding is less. Whether the data in the system is usable and readable by the system is depending on the coding. In the project, the coding is being done such that proper validations are made to get the perfect input. No error inputs are accepted. In addition care is taken such that the data integrity and referential integrity is not violated in the database. When large volumes of data are being handled, it is important that the items to be stored selected easily and quickly. To accomplish this, each data item must have a unique specification and must be related to other forms or item of data of the same type. The master file transaction within related to the same type in the other table with using primary key. A primary key item in master file is related to another table. In that table, it acts as the foreign key.

5.4 OUTPUT DESIGN


Output Design generally refers to the results and informations that are generated by the system for many end-users, output is the main reason for developing the system and the basis on which they evaluate the usefulness of the application. The objective of a system finds its shape in terms of the output. The analysis of the objective of a system leads to determination of outputs. Outputs of a system can face various forms. The most common are reports, screen displays, printed forms, graphical drawings etc.,The output also vary in terms of their contents frequency, timing and format. The user of the output from a system are the justification for its existence. If the output are inadequate in any way, the system are itself is adequate. The basic requirements of output are that it should be accurate, timely and appropriate, in terms of content, medium and layout for its intended purpose. When designing output, system analysis most accomplish things like, to determine what information to be present, to decide whether to display or print the information and select the output medium and to decide how to distribute the output to intended recipients.

External outputs are those whose destination will be outside the organization and which require special attention as they project the image of the organization. Internal outputs are those whose destination is within the organization. it is to be carefully designed as they are the users main interface with the system.

IP S C A N N E R

5.5 SYSTEM FLOW DIAGRAM

IP A D D R E S S A D D IP A D D R ESS

SH O W

V IE W

CONNEC T

S E T T IN G S

ABOUT

U SER

E X IT

SYSTEM FL OW DIAGRAM

CO PUTER NAM E

IP A D D R E S S L IS T

FTP

CHANGE PA SSW O R D

CREATE U SER

D E L E T E IP A D D R ESS

GROUP NAM E

HTTP CHANGE PA SSW O R D

M A C A D D R E SS

T IM E T O L IV E

P IN G

TRAC E ROUTE

L IS T E N L O C A L P O R T S

L IS T E N R E M O V E P O R T S

5.7 DATA FLOW DIAGRAM


DATA FLOW DIAGRAM

Level - 0

IP SCANNER LOGIN GET INTO THE SYSTEM USERS

Level - 1

IP ADDRESS

NODES NODE DETAILS

6. SYSTEM TESTING AND MAINTENANCE


TESTING
After the source code has been completed, documented as related data structures. Completed the project has to undergo testing and validation where there is subtitle and definite attempt to get errors. The project developer treads lightly, designing and execution test that will demonstrates that the program works rather than uncovering errors, unfortunately errors will be present and if the project developer doesnt find them, the user will find out. The project developer is always responsible for testing the individual units i.e. modules of the program. In many cases developer also conducts integration testing i.e. the testing step that leads to the construction of the complete program structure. This project has undergone the following testing procedures to ensure its correctness. Unit testing Integration testing Validation testing Acceptance Testing

6.1 UNIT TESTING


In unit testing, we have to test the programs making up the system. For this reason, Unit testing sometimes called as Program testing. The software units in a system are the modules and routines that are assembled and integrated to perform a specific function, Unit testing first on the modules indepently of one another, to locate errors. This enables, to detect errors in coding and logic that are contained with the module alone. The testing was carried out during programming stage itself.

6.2 INTEGRATION TESTING


Integration testing is a systematic technique for constructing the program structure. While at the same time conducting tests to uncover errors associated with interfacing. The objective is to take unit tested modules and build a program structure that has been dictated by design. In this integration testing its done using the main module and based on the type of integration testing the subordinate stubs are replaced one at a time with actual modules.

6.3 VALIDATION TESTING


In the project Validation is made such that, only the raw materials entered in the raw material master table can be accepted during the purchase. Only after the selection of the products, the record can be added. Otherwise a message is displayed to enter the product details. During the purchase return, the item quantity returned cannot exceed the stock maintained. Negative stock is not allowed. The customer details entered in the lot section details alone can be entered in the delivery bill.

6.4 ACCEPTANCE TESTING


The system under consideration is tested for user acceptance by constantly keeping in touch with the prospective system user at the time of developing and making changes whenever required.

7. SYSTEM IMPLEMENTATION AND MAINTENANCE


7.1 IMPLEMENTATION
When the initial design was done for the system, the client was consulted for the acceptance of the design so that further proceedings of the system development can be carried on. After the development of the system a demonstration was given to them about the working of the system. The aim of the system illustration was to identify any malfunction of the system. After the management of the system was approved the system implemented in the concern, initially the system was run parallaly with existing manual system. The system has been tested with live data and has proved to be error free and user friendly. Implementation is the process of converting a new or revised system design into an operational one when the initial design was done by the system; a demonstration was given to the end user about the working system. This process is uses to verify and identify any logical mess working of the system by feeding various combinations of test data. After the approval of the system by both end user and management the system was implemented. System implementation is made up of many activities. The six major activities as follows.

Coding Testing Installation Documentation Training and support

Coding
Coding is the process of whereby the physical design specifications created by the analysis team turned into working computer code by the programming team.

Testing
Once the coding process is begin and proceed in parallel, as each program module can be tested.

Installation
Installation is the process during which the current system is replaced by the new system. This includes conversion of existing data, software, and documentation and work procedures to those consistent with the new system.

Documentation
It is result from the installation process, user guides provides the information of how the use the system and its flow.

Training and support


Training plan is a strategy for training user so they quickly learn to the new system. The development of the training plan probably began earlier in the project. The best-suited application package to develop medical system is Visual Basic .NET under windows XP environment. Visual Basic .NET has all them features that can store, edit, retrieve, and print information quickly and easily access the broad range of application.

7.2 MAINTENANCE
After development of the software, Maintenance of software is important aspect. Maintainability is the ease with which software can be understood and corrected, adapted and enhanced. The goal is to improve the ease with which changes can be accommodated and reduce the amount of effort expanded on maintenance. Software maintenance is one of the phases in, and follows deployment of the software into the field. The software maintenance phase involves changes to the software in order to correct defects and deficiencies found during field usage as well as the addition of new functionality to improve the software's and applicability. Maintenance can be classified as, Corrective Adaptive Perfective.

CORRECTIVE MAINTENANCE
Corrective maintenance means repairing processing or performance failures or making changes because of previously uncorrected problems of false assumptions. In this project, the existing system cant control the task manger with maximum duration of the time, now it is over come with user time consumption.

PERFECTIVE MAINTENANCE
Perfective maintenance means enhancing performance or modifying the programs to respond to the users additional or changing needs. In this project, various links are available instead of menus are available so it successfully interactive with the user.

ADAPTIVE MAINTENANCE
Adaptive maintenance means changing the program function. Of these types more time and money are spent on perfective than on corrective and adaptive maintenance together. This project should be inter-operability with Hardware devices and also interact with the other softwares.

8. CONCLUSION
It is believed that almost all the system objectives that have been planned at the commencement of the software development have been net with and the implementation process of the project is completed. A trial run of the system has been made and is giving good results the procedures for processing is simple and regular order. The process of preparing plans had been a new experience, which was found use full in later phases of the project is completed. Efforts have been taken to make the system user friendly and as simple as possible. However at some points some features may have been missed out which might be considered for further modification of the application

9. SCOPE FOR FUTURE DEVELOPMENT


The project provides a best assistance in the network based regime. It allows adding up the following facilities in future, It can able to control the remote port of the computer. It can able to restrict the particular type of files from the network. As single software able to provide in the network to the whole network.

10. BIBLIOGRAPHY
1) 2) 3) 4) 5)
. NET developers guide 2002- Prentice-Hall India.- Grey Buczek, VB.NET by example 2003 TataMcGraw-Hill- Benolt Marchal, System Analysis & Design Alenis Leon. An Integral approach to software engineering Pankaj Jalole. Microsoft Visual Basic.NET Programmers Cookbook(TataMcGraw-Hill Edition)-MATTHEW MACDONALD

6)

Jittery R.Shapiro, The Complete Reference Visual Basic .NET Edition 2002, Tata McGraw-Hill, Publishing Company Limited, New Delhi.

WEBSITES
1. http://www.microsoft.com/dotnet/visual basic http://www.dotnetheaven.com

Das könnte Ihnen auch gefallen